Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.2.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.2.81.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 15:44:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
81.2.226.137.in-addr.arpa domain name pointer db-s14.campus.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.2.226.137.in-addr.arpa	name = db-s14.campus.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.130.205 attackspambots
2020-07-06T07:51:41.523093ks3355764 sshd[23473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.130.205  user=root
2020-07-06T07:51:43.541054ks3355764 sshd[23473]: Failed password for root from 51.38.130.205 port 47538 ssh2
...
2020-07-06 19:43:30
124.207.98.213 attackspambots
prod11
...
2020-07-06 19:15:07
77.109.173.12 attack
$f2bV_matches
2020-07-06 19:38:48
61.177.172.102 attack
Jul  6 04:07:19 dignus sshd[12657]: Failed password for root from 61.177.172.102 port 39376 ssh2
Jul  6 04:07:22 dignus sshd[12657]: Failed password for root from 61.177.172.102 port 39376 ssh2
Jul  6 04:07:24 dignus sshd[12657]: Failed password for root from 61.177.172.102 port 39376 ssh2
Jul  6 04:07:26 dignus sshd[12684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102  user=root
Jul  6 04:07:29 dignus sshd[12684]: Failed password for root from 61.177.172.102 port 64447 ssh2
...
2020-07-06 19:09:34
146.0.41.70 attackbotsspam
Jul  6 07:42:43 bchgang sshd[18444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70
Jul  6 07:42:45 bchgang sshd[18444]: Failed password for invalid user dev from 146.0.41.70 port 57300 ssh2
Jul  6 07:45:54 bchgang sshd[18497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70
...
2020-07-06 19:52:47
49.235.23.20 attackspam
2020-07-06T03:45:20.769483abusebot-4.cloudsearch.cf sshd[30453]: Invalid user show from 49.235.23.20 port 40649
2020-07-06T03:45:20.774594abusebot-4.cloudsearch.cf sshd[30453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20
2020-07-06T03:45:20.769483abusebot-4.cloudsearch.cf sshd[30453]: Invalid user show from 49.235.23.20 port 40649
2020-07-06T03:45:22.386717abusebot-4.cloudsearch.cf sshd[30453]: Failed password for invalid user show from 49.235.23.20 port 40649 ssh2
2020-07-06T03:47:42.773496abusebot-4.cloudsearch.cf sshd[30544]: Invalid user ubuntu from 49.235.23.20 port 48195
2020-07-06T03:47:42.779388abusebot-4.cloudsearch.cf sshd[30544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20
2020-07-06T03:47:42.773496abusebot-4.cloudsearch.cf sshd[30544]: Invalid user ubuntu from 49.235.23.20 port 48195
2020-07-06T03:47:45.219414abusebot-4.cloudsearch.cf sshd[30544]: Failed passwor
...
2020-07-06 19:45:38
194.26.29.112 attackbots
Jul  6 13:07:51 debian-2gb-nbg1-2 kernel: \[16292280.659284\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.112 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=21650 PROTO=TCP SPT=43117 DPT=18000 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 19:10:12
107.170.195.87 attackspambots
fail2ban -- 107.170.195.87
...
2020-07-06 19:34:18
36.111.182.128 attackbotsspam
 TCP (SYN) 36.111.182.128:45644 -> port 24278, len 44
2020-07-06 19:36:51
46.38.150.132 attack
2020-07-06T05:31:50.848394linuxbox-skyline auth[642403]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=godzila rhost=46.38.150.132
...
2020-07-06 19:32:59
65.152.119.226 attackbotsspam
VNC brute force attack detected by fail2ban
2020-07-06 19:47:23
132.232.6.207 attackspambots
SSH Login Bruteforce
2020-07-06 19:39:29
103.138.109.89 attackbots
(smtpauth) Failed SMTP AUTH login from 103.138.109.89 (VN/Vietnam/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-06 08:18:13 login authenticator failed for (7zIldrnobP) [103.138.109.89]: 535 Incorrect authentication data (set_id=info)
2020-07-06 19:13:12
222.186.175.216 attackspambots
Jul  6 13:34:11 minden010 sshd[18131]: Failed password for root from 222.186.175.216 port 26560 ssh2
Jul  6 13:34:15 minden010 sshd[18131]: Failed password for root from 222.186.175.216 port 26560 ssh2
Jul  6 13:34:18 minden010 sshd[18131]: Failed password for root from 222.186.175.216 port 26560 ssh2
Jul  6 13:34:24 minden010 sshd[18131]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 26560 ssh2 [preauth]
...
2020-07-06 19:35:38
180.241.106.251 attackbots
1594007262 - 07/06/2020 05:47:42 Host: 180.241.106.251/180.241.106.251 Port: 445 TCP Blocked
2020-07-06 19:49:36

Recently Reported IPs

5.167.64.69 137.226.1.217 172.104.190.222 137.226.2.74
104.248.198.221 198.54.128.102 137.226.2.164 120.48.15.133
79.78.143.25 5.167.65.3 176.104.48.21 137.226.2.177
5.167.65.10 5.167.64.254 85.119.84.11 193.233.185.220
181.113.21.163 137.226.2.80 188.150.249.81 137.226.2.93